{"id":1783,"date":"2020-11-17T09:04:00","date_gmt":"2020-11-17T09:04:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1783"},"modified":"2021-09-17T09:35:26","modified_gmt":"2021-09-17T09:35:26","slug":"spam-vs-phishing","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/","title":{"rendered":"Spam vs Phishing: What&#8217;s the Difference Between Them?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">56.51% of all emails are spam (<a href=\"https:\/\/securelist.com\/spam-report-2019\/96527\/\">Kaspersky<\/a>), and 65% of U.S. organizations faced successful phishing attacks in 2019 (<a href=\"https:\/\/www.proofpoint.com\/sites\/default\/files\/gtd-pfpt-uk-tr-state-of-the-phish-2020-a4_final.pdf\">Proofpoint<\/a>)! But are they different? Let\u2019s explore spam vs phishing in laymen\u2019s terms!<\/h2>\n\n\n\n<p>Spam vs phishing \u2014 although people use the words \u201cspam\u201d and \u201cphishing\u201d interchangeably, the terms have related but different meanings. They\u2019re both terms that describe pesky, unsolicited communications that try to manipulate targets into doing something. This could be providing some type of information about yourself \u2014 personal info, login credentials, etc. \u2014 or engaging with a malicious link or file. &nbsp;<\/p>\n\n\n\n<p>But what is the meaning of spam and what does phishing mean? In this article, we\u2019ll talk about spam vs phishing in detail. We&#8217;ll also explore the difference between spam and phishing in terms of email, phone calls, and text messages.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Spam vs Phishing<strong>:<\/strong> Meaning<\/h2>\n\n\n\n<p><strong>Spam<\/strong>: Any <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/0038-spam\">unsolicited or unwanted commercial message<\/a> is generally considered spam. The purpose of a spam is to inundate as many people as possible to advertise the products and services. Spam messages are not harmful in nature. They\u2019re just unwanted and occupy unnecessary space in your inbox. Spam is all about the numbers. When you hit enough people with your spam messages, even minimal success rates pay off in the long run.<\/p>\n\n\n\n<p><strong>Phishing<\/strong>: <a href=\"https:\/\/www.thesslstore.com\/blog\/gone-phishing\/\">Phishing<\/a> is a way for scammers and cybercriminals to impersonate a legal entity or to use other methods to defraud their targets. The goal of phishing is to get users to share confidential information and credentials, click on malicious links, download malware, or engage with virus-loaded attachments. <\/p>\n\n\n\n<p><strong>Spam Vs. Phishing<\/strong>: Spam messages are unsolicited commercial messages for marketing purposes while phishing is done to defraud people and make them victims of cybercrimes. Hence, when we talk about spam vs phishing, the difference lies between the sender&#8217;s intentions and the messages&#8217; contents. Spam and phishing are typically done via these three popular mediums.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Emails<\/li><li>Phone calls<\/li><li>SMS<\/li><\/ul>\n\n\n\n<p>Let&#8217;s explore spam vs. phishing in the context of each of them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Spam vs Phishing: Emails<\/h2>\n\n\n\n<p>Emails are the most popular spamming and phishing techniques. This table will help you understand the difference between spam and phishing quickly. After that, we will cover the differences in detail. <\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>&nbsp;<\/strong><\/td><td><strong>Spam<\/strong><\/td><td><strong>Phishing<\/strong><\/td><\/tr><tr><td><strong>Purpose<\/strong><\/td><td>To promote and market products and services<\/td><td>To defraud recipients<\/td><\/tr><tr><td><strong>Nature<\/strong><\/td><td>Unwanted commercial emails, typically benign in nature.<\/td><td>Misleading messages that appear to come from legit entities but are designed to be malicious in nature.<\/td><\/tr><tr><td><strong>Contain<\/strong><\/td><td>Product\/service advertisements, coupon codes, deals, discounts, inquiry, or survey forms<\/td><td>Malware-loaded attachments, infected links, links that redirect to spammy websites, deceptive messages that make recipients share their PII\/financial information<\/td><\/tr><tr><td><strong>Legislation<\/strong><\/td><td>The U.S. <a href=\"https:\/\/uscode.house.gov\/view.xhtml?req=granuleid%3AUSC-prelim-title15-chapter103&amp;edition=prelim\">Non-Solicited Pornography and Marketing Act of 2003<\/a> For other countries: <a href=\"https:\/\/chamaileon.io\/resources\/ultimate-email-spam-law-collection\/\">Anti-Spam laws<\/a><\/td><td>The U.S. federal criminal law, Various state laws<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Now, let&#8217;s have an in-depth explanation of the differences. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Is Spam in the Context of Email?<\/h3>\n\n\n\n<p>Any electronic messages sent out for the commercial advertisement or promotion of the product, service, or website content are considered spam. Email spamming is a legal activity under the Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003, which is known as the <a href=\"https:\/\/uscode.house.gov\/view.xhtml?req=granuleid%3AUSC-prelim-title15-chapter103&amp;edition=prelim\">CAN-SPAM<\/a> act.<\/p>\n\n\n\n<p>These are some key CAN-SPAM rules that the sender must comply with:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Email must have an active and visible unsubscribe link or button.<\/strong> The sender gets 10 days to act on the unfollow request and to cease emailing the recipient.<\/li><li><strong>Sender&#8217;s email address must be accurate<\/strong>. The &#8220;from&#8221; line not misleading and the subject of the message must be relevant to the body of the message.<\/li><li><strong>Sender\u2019s physical address must be mentioned<\/strong>. A physical address (or P.O. Box number) of the sender (company, individual sender, advertiser, or the third-party marketing agency) must be present in the email.<\/li><li><strong>Recipients must be warned if the email has adult content. <\/strong>If the content is adult in nature, it must be labeled as &#8220;SEXUALLY EXPLICIT.&#8221;<\/li><li><strong>Sender should send email from multiple email addresses<\/strong>. The sender should not send spam messages to the same recipient from different email addresses.<\/li><li><strong>Emails must not contain malware<\/strong>: The spam messages must not contain malware (viruses, worms, trojan horses, etc.) or redirect users to malicious websites.<\/li><\/ul>\n\n\n\n<p>When companies send emails to the current customers or to the business leads (people who have inquired about products\/services) for follow-up, feedback, suggestions, or any other type of communication, such messages are also not considered to be spam. These messages are classified as <strong>relationship messages<\/strong> under CAN-SPAM. Even political and religious emails are also except from the SMAP\u2019s definition in CAN-SPAM.<\/p>\n\n\n\n<p>Most of the email clients automatically detect spam emails and dump them in the spam\/junk folder. All the attachments and images are also blocked in such an email. But if you\u2019re still getting unwanted spam emails in your inbox, you can unsubscribe from them. (Just be careful to check the unsubscribe link first to ensure it\u2019s not a phishing or malicious link.) Also, you can right-click on the email in your inbox to move it to the spam folder. You can also block the sender.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Here\u2019s an example of a typical spam email:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"726\" height=\"414\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phishing-email-example1.png\" alt=\"Spam vs phishing screenshot example of a spam email\" class=\"wp-image-1786\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phishing-email-example1.png 726w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phishing-email-example1-300x171.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phishing-email-example1-560x319.png 560w\" sizes=\"auto, (max-width: 726px) 100vw, 726px\" \/><\/figure>\n\n\n\n<p>This is a spam email I got from a logo designing website. The content in the subject line matches the content of the email. You can also see the email has an unsubscribed tab and the physical address of the company. That means it is a spam email that is following all the SPAM-CAN\u2019s guidelines.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Is Phishing in the Context of Email?<\/h3>\n\n\n\n<p>Scammers send <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\">phishing emails<\/a> posing as a company or person that the recipients trust. These emails are deceptive in nature. Phishing emails are crafted in a way that they look like coming from your bank, ecommerce site, university, government, employer, relatives, or colleagues. <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/2020-data-breach-investigations-report.pdf?mkt_tok=eyJpIjoiWm1NeE16ZzJaak16T1dWbSIsInQiOiIwVFZjOFFSSG43YVZ5SWZRUlhaMmg0NjVuZjc3NksrbUlOZzBmc2pYR0Z0NDJITGNZZlhxWVVIMWF3QVhYQVhxc0JzcWhvVmoydDczWVwvTTkxVytaNG5TQUVIVlJGYW1DcHpnWjdiQnk1OUV2bytEUFhwSFZNOXRNODRidDVzWUkifQ%3D%3D\">96% of phishing attacks<\/a> occur via email, Verizon\u2019s 2020 Data Breach Investigations Report (DBIR) shows.<\/p>\n\n\n\n<p>These emails might contain malware-laden attachments, malicious links, or redirects to spammy websites. Sometimes the attackers try to trigger an emotional response from the recipients and indulge in sharing their confidential information such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Payment card numbers,<\/li><li>Phone numbers,<\/li><li>Physical address,<\/li><li>Social security number (SSN),<\/li><li>Tax-related information, and<\/li><li>Health information<\/li><\/ul>\n\n\n\n<p>The general motives behind phishing emails include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Financial fraud,<\/li><li>Identity theft,<\/li><li>Login credentials theft,<\/li><li>Spreading malware (worms, viruses, trojans, rootkits, adware, etc.), and<\/li><li>Redirecting recipients to malicious websites.<\/li><\/ul>\n\n\n\n<p>Below is an example of a typical phishing email. The email looks like coming from PayPal, but if you check the sender&#8217;s email address carefully, you would see that it is coming from a scam artist, and the benign-looking PDF attachment might contain dangerous malware.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"664\" height=\"255\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phishing-email-example2.png\" alt=\"Spam vs phishing graphic example of a phishing email\" class=\"wp-image-1787\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phishing-email-example2.png 664w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phishing-email-example2-300x115.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phishing-email-example2-560x215.png 560w\" sizes=\"auto, (max-width: 664px) 100vw, 664px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.ncsl.org\/research\/telecommunications-and-information-technology\/state-phishing-laws.aspx\">Many U.S. states<\/a> have different laws for phishing. There is no federal law that directly criminalizes phishing, but the federal criminal laws apply to financial fraud and identity theft crimes done via phishing.<\/p>\n\n\n\n<p>If you have become the victim of a phishing email, you can register your complaint to the&nbsp;<a href=\"http:\/\/www.ic3.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">www.ic3.gov<\/a>,&nbsp;<a href=\"https:\/\/www.ftccomplaintassistant.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">ftc.gov\/complaint<\/a> or&nbsp;<a href=\"mailto:reportphishing@apwg.org\" target=\"_blank\" rel=\"noreferrer noopener\">reportphishing@apwg.org<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Spam vs Phishing: Voice Messages and Phone Calls<\/h2>\n\n\n\n<p>Perpetrators use phone calls to spam and phish targets.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Spam Calls<\/h3>\n\n\n\n<p>If you receive an unsolicited phone call for marketing purposes, especially from a company you\u2019ve never dealt with before, it can be categorized as a spam call. The definition of marketing calls and spam calls can be blurred.<\/p>\n\n\n\n<p>For example, if you suddenly get a phone call to apply for a credit card from a card company you never dealt with before, it is considered to be a spam call. But if someone calls you to sell the new card or insurance policies from the bank you already have an account with, it\u2019s considered a mere marketing call to sell additional products. In the U.S., the <a href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/47\/227\">Telephone Consumer Protection Act<\/a> (TCPA) and the <a href=\"https:\/\/www.fcc.gov\/general\/telemarketing-and-robocalls\">Federal Communications Commission (FCC)<\/a> place restrictions on spam calls and telemarketing messages.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Voice Phishing (Vishing)<\/h3>\n\n\n\n<p>When the perpetrators make phone calls impersonating someone else with the purpose of defrauding you, it is known as voice phishing or vishing. For example, a cheater calls you posing as a bank manager and asking you to provide the last four digits of your social security number and some other personal details to send you a new credit card.<\/p>\n\n\n\n<p>Sometimes, attackers use a leaked database or utilize their social engineering skills to do a little research about the potential victims before calling. For example, they call college students impersonating as a bank employee who handles student loans or a representative from the state\/federal student aid department that wants more information regarding their scholarship application. In short, instead of cold calling random numbers, scammers make a phone call understanding their target audience so that they sound legit to the potential victims.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Spam vs Phishing: Text Messaging<\/h2>\n\n\n\n<p>There are websites and tools available these days that can send bulk text messages at unbelievably low costs. That\u2019s why spammers and phishing scammers love to send their messages via text messages, too! You\u2019re able to reach users on their cell phones wherever they are.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Spam Text Messages<\/h3>\n\n\n\n<p>When companies send unsolicited bulk text messages for commercial, non-malicious purposes, they&#8217;re known as spam text messages or spam SMS messages. These messages may contain product information, details of special deals\/discounts, offers, schemes, coupon codes, etc. They might also have links to the product\/service website.<\/p>\n\n\n\n<p>Some spam SMS texts are sent as a survey to gain more information about potential customers. The purpose of such text messages can be selling a product or service, branding, collecting more information (such as demographics, buying habits, purchasing power, like\/preferences, etc.) of the recipients. Text spamming is also covered under <a href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/47\/227\">The Telephone Consumer Protection Act<\/a> (TCPA).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SMS Phishing (Smishing)<\/h3>\n\n\n\n<p>Here, scammers send text messages while impersonating legitimate organizations. The nature and purpose of such phishing SMS messages are the same as phishing emails \u2014 i.e., to defraud the recipients. The attackers try to trick or manipulate you into:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Sharing your personal or financial information,<\/li><li>Completing financial transactions,<\/li><li>Downloading malware-laden attachments, or<\/li><li>Clicking on the links in the SMS texts that lead you to malicious websites.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Wrapping Up on Spam vs Phishing<\/h2>\n\n\n\n<p>The topic of spam vs phishing, or more specifically the difference between spam and phishing, can be confusing. But by now, we can safely assume that you know spam is the annoying yet more benign type of message, whereas phishing facilitates cybercrime. But the fine line between phishing and spam gets blurred when the spammer violates some of the CAN-SPAM\u2019s (or your country\u2019s <a href=\"https:\/\/chamaileon.io\/resources\/ultimate-email-spam-law-collection\/\">laws<\/a> related to SPAM) guidelines. For example, the email\u2019s content or sender\u2019s email address is deceptive in nature, or the email\/text messages contain malware (or links to malicious websites).<\/p>\n\n\n\n<p>Spamming can sometimes be so annoying that you feel like changing your phone number or email address! On the other hand, phishing can lead you into becoming a cybercrime victim. So, educate yourself and your employees further about phishing scams and how to recognize them successfully.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>56.51% of all emails are spam (Kaspersky), and 65% of U.S. organizations faced successful phishing attacks in 2019 (Proofpoint)! But are they different? Let\u2019s explore spam vs phishing in laymen\u2019s&#8230;<\/p>\n","protected":false},"author":6,"featured_media":1788,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[30,154,153],"class_list":["post-1783","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email-security","tag-phishing","tag-spam","tag-spam-vs-phishing","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Spam vs Phishing: What&#039;s the Difference Between Them? - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"Explore the differences between spam vs phishing. We&#039;ll give you definitions, examples, &amp; a general overview of the differences between them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spam vs Phishing: What&#039;s the Difference Between Them? - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"Explore the differences between spam vs phishing. We&#039;ll give you definitions, examples, &amp; a general overview of the differences between them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-17T09:04:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-17T09:35:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phish-email2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Medha Mehta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Medha Mehta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/spam-vs-phishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/spam-vs-phishing\\\/\"},\"author\":{\"name\":\"Medha Mehta\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"headline\":\"Spam vs Phishing: What&#8217;s the Difference Between Them?\",\"datePublished\":\"2020-11-17T09:04:00+00:00\",\"dateModified\":\"2021-09-17T09:35:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/spam-vs-phishing\\\/\"},\"wordCount\":1848,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/spam-vs-phishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/spam-vs-phish-email2.jpg\",\"keywords\":[\"phishing\",\"spam\",\"spam vs phishing\"],\"articleSection\":[\"Email Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/spam-vs-phishing\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/spam-vs-phishing\\\/\",\"name\":\"Spam vs Phishing: What's the Difference Between Them? - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/spam-vs-phishing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/spam-vs-phishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/spam-vs-phish-email2.jpg\",\"datePublished\":\"2020-11-17T09:04:00+00:00\",\"dateModified\":\"2021-09-17T09:35:26+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"description\":\"Explore the differences between spam vs phishing. We'll give you definitions, examples, & a general overview of the differences between them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/spam-vs-phishing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/spam-vs-phishing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/spam-vs-phishing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/spam-vs-phish-email2.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/spam-vs-phish-email2.jpg\",\"width\":1600,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/spam-vs-phishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spam vs Phishing: What&#8217;s the Difference Between Them?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\",\"name\":\"Medha Mehta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"caption\":\"Medha Mehta\"},\"description\":\"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.\",\"sameAs\":[\"https:\\\/\\\/sectigostore.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spam vs Phishing: What's the Difference Between Them? - InfoSec Insights","description":"Explore the differences between spam vs phishing. We'll give you definitions, examples, & a general overview of the differences between them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/","og_locale":"en_US","og_type":"article","og_title":"Spam vs Phishing: What's the Difference Between Them? - InfoSec Insights","og_description":"Explore the differences between spam vs phishing. We'll give you definitions, examples, & a general overview of the differences between them.","og_url":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/","og_site_name":"InfoSec Insights","article_published_time":"2020-11-17T09:04:00+00:00","article_modified_time":"2021-09-17T09:35:26+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phish-email2.jpg","type":"image\/jpeg"}],"author":"Medha Mehta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Medha Mehta","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/"},"author":{"name":"Medha Mehta","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"headline":"Spam vs Phishing: What&#8217;s the Difference Between Them?","datePublished":"2020-11-17T09:04:00+00:00","dateModified":"2021-09-17T09:35:26+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/"},"wordCount":1848,"image":{"@id":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phish-email2.jpg","keywords":["phishing","spam","spam vs phishing"],"articleSection":["Email Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/","url":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/","name":"Spam vs Phishing: What's the Difference Between Them? - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phish-email2.jpg","datePublished":"2020-11-17T09:04:00+00:00","dateModified":"2021-09-17T09:35:26+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"description":"Explore the differences between spam vs phishing. We'll give you definitions, examples, & a general overview of the differences between them.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phish-email2.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/spam-vs-phish-email2.jpg","width":1600,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/spam-vs-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Spam vs Phishing: What&#8217;s the Difference Between Them?"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15","name":"Medha Mehta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","caption":"Medha Mehta"},"description":"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.","sameAs":["https:\/\/sectigostore.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1783"}],"version-history":[{"count":8,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1783\/revisions"}],"predecessor-version":[{"id":2570,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1783\/revisions\/2570"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1788"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}